Skip to main content

Iran claims thwarting of US cyber attack on oil ministry








Reuters/Kacper Pempel


Iranian security experts have thwarted an industrial espionage attempt on Islamic Republic's oil ministry, cyber police chief announced, claiming the attack originated in the US.

Speaking at a cyber crime forum in Tehran on Tuesday, the head of Iran’s Cyber Police (FATA) Brigadier General Seyed Kamal Hadianfar announced that Cyber Attacks Emergency Center had defended the oil ministry against hackers. The alleged attack took place during a four-day holiday on March 21-24.

“These hackers were from the US” Hadianfar said, as cited by FARS news agency. “The IP address for these hackers was in America.”

The chief of cyber police said that Tehran had already informed Washington via an official letter and issued an “international judicial order” as FATA passed the issue to the foreign ministry.


FATA discovers, identifies and solves some 90 percent of Internet crimes committed against Iran, Iran’s Interior Minister Abdolreza Rahmani Fazli said speaking at the same event. “Iran has had a low number of cyber crimes as compared to other countries despite the presence of over 46 million Internet users in the country,” the minister added.

The cyber standoff between Iran and the US has been widely reported over recent years. Both US and Tehran have accused each other of cybercrimes aimed at strategic sectors of the government and the economy.

In February 2015, US Director of National Intelligence James Clapper named Iran among the leading cyber threats to the United States. In the same month the Islamic Republic revealed that several cyber attacks on Iran's scientific and industrial infrastructures had been thwarted.

“Our enemies have undertaken many cyber war actions and of course the Islamic Republic of Iran’s Armed Forces have also made eye-catching progress in area of cyber warfare and have been able to give proper responses to the enemies at different times,” Senior Military Aide to the Supreme Leader Major General Yahya Rahim Safavi was quoted at the time as saying.






One of the most well-known attacks on Iranian state infrastructure was carried out in 2010. A sophisticated malware called Stuxnet, apparently designed by a state actor, was used to infect equipment at Natanz nuclear facilities. The destructive computer worm compromised centrifuges, crippling Iran’s nuclear enrichment capabilities. Tehran blamed the attack on the US, with Edward Snowden later confirming the tool was likely created by the NSA and co-written by Israel.

For its part the US State Department earlier this month refereed to Iran as a “sophisticated cyber adversary.” Iran is “rapidly building cyber warfare capabilities” and may be planning a cyber attack on critical infrastructure, a State Department security report warned.

Comments

Popular posts from this blog

Why States Still Use Barrel Bombs

Smoke ascends after a Syrian military helicopter allegedly dropped a barrel bomb over the city of Daraya on Jan. 31.(FADI DIRANI/AFP/Getty Images) Summary Barrel bombs are not especially effective weapons. They are often poorly constructed; they fail to detonate more often than other devices constructed for a similar purpose; and their lack of precision means they can have a disproportionate effect on civilian populations. However, combatants continue to use barrel bombs in conflicts, including in recent and ongoing conflicts in Africa and the Middle East, and they are ideally suited to the requirements of resource-poor states. Analysis Barrel bombs are improvised devices that contain explosive filling and shrapnel packed into a container, often in a cylindrical shape such as a barrel. The devices continue to be dropped on towns all over Syria . Indeed, there have been several documented cases of their use in Iraq over the past months, and residents of the city of Mosul, which was re

Russia Looks East for New Oil Markets

Click to Enlarge In the final years of the Soviet Union, Soviet leader Mikhail Gorbachev began orienting his foreign policy toward Asia in response to a rising Japan. Putin has also piloted a much-touted pivot to Asia, coinciding with renewed U.S. interest in the area. A good expression of intent was Russia's hosting of the Asia-Pacific Economic Cooperation summit in 2012 in Vladivostok, near Russia's borders with China and North Korea. Although its efforts in Asia have been limited by more direct interests in Russia's periphery and in Europe, Moscow recently has been able to look more to the east. Part of this renewed interest involves finding new export markets for Russian hydrocarbons. Russia's economy relies on energy exports, particularly crude oil and natural gas exported via pipeline to the West. However, Western Europe is diversifying its energy sources as new supplies come online out of a desire to reduce its dependence on Russian energy supplies . This has

LONDON POLICE INDIRECTLY ENCOURAGE CRIMINALS TO ATTACK RUSSIAN DIPLOMATIC PROPERTY

ILLUSTRATIVE IMAGE A few days ago an unknown perpetrator trespassed on the territory of the Russian Trade Delegation in London, causing damage to the property and the vehicles belonging to the trade delegation , Russian Foreign Ministry Spokeswoman Maria Zakharova said during the September 12 press briefing. The diplomat revealed the response by the London police was discouraging. Police told that the case does not have any prospects and is likely to be closed. This was made despite the fact that the British law enforcement was provided with video surveillance tapes and detailed information shedding light on the incident. By this byehavior, British law inforcements indirectly encourage criminals to continue attacks on Russian diplomatic property in the UK. Zakharova’s statement on “Trespassing on the Russian Trade Mission premises in London” ( source ): During our briefings, we have repeatedly discussed compliance with the Vienna Convention on Diplomatic Relations, specif